C++ Chapter 8 Test Answers
Refer to the exhibit. A network administrator is configuring a standard IPv4 ACL. What is the effect after the command no access-list 10 is entered?
radio_button_unchecked ACL 10 will be disabled and removed after R1 restarts. CORRECT ACL 10 is removed from the running configuration. radio_button_unchecked ACL 10 is disabled on Fa0/1. radio_button_unchecked ACL 10 is removed from both the running configuration and the interface Fa0/1.
What is a feature of an IPS?
radio_button_unchecked It is primarily focused on identifying possible incidents. CORRECT It can stop malicious packets. radio_button_unchecked It is deployed in offline mode. radio_button_unchecked It has no impact on latency.
A network administrator is troubleshooting the dynamic NAT that is configured on router R2. Which command can the administrator use to see the total number of active NAT translations and the number of addresses that are allocated from the NAT pool?
radio_button_unchecked R2# show ip nat translations CORRECT R2# show ip nat statistics radio_button_unchecked R2# show running-config radio_button_unchecked R2# clear ip nat translation
ACTUAL QUESTION 1, quizlet has shitty ui. Which step in the link-state routing process is described by a router building a link-state database based on received LSAs?
radio_button_unchecked executing the SPF algorithm CORRECT building the topology table radio_button_unchecked selecting the router ID radio_button_unchecked declaring a neighbor to be inaccessible
A technician is tasked with using ACLs to secure a router. When would the technician use the access-class 20 in configuration option or command?
radio_button_unchecked to remove all ACLs from the router radio_button_unchecked to display all restricted traffic CORRECT to secure administrative access to the router radio_button_unchecked to secure management traffic into the router
Which step in the link-state routing process is described by a router building a link-state database based on received LSAs?
radio_button_unchecked declaring a neighbor to be inaccessible radio_button_unchecked executing the SPF algorithm CORRECT building the topology table radio_button_unchecked selecting the router ID
When an OSPF network is converged and no network topology change has been detected by a router, how often will LSU packets be sent to neighboring routers?
radio_button_unchecked every 10 minutes CORRECT every 30 minutes radio_button_unchecked every 60 minutes radio_button_unchecked every 5 minutes
Which type of OSPFv2 packet contains an abbreviated list of the LSDB of a sending router and is used by receiving routers to check against the local LSDB?
radio_button_unchecked link-state request CORRECT database description radio_button_unchecked link-state acknowledgment radio_button_unchecked link-state update
Which command will a network engineer issue to verify the configured hello and dead timer intervals on a point-to-point WAN link between two routers that are running OSPFv2?
radio_button_unchecked show ip ospf interface fastethernet 0/1 CORRECT show ip ospf interface serial 0/0/0 radio_button_unchecked show ipv6 ospf interface serial 0/0/0 radio_button_unchecked show ip ospf neighbor
Which VPN solution allows the use of a web browser to establish a secure, remote-access VPN tunnel to the ASA?
site-to-site using an ACL client-based SSL (CoRRECT)clientless SSL site-to-site using a preshared key
Why would a network administrator use the config-register 0x2102 command on a Cisco network device?
to monitor and manage network performance, find and solve network problems, and plan for network growth to learn device names, IOS versions, and the number and type of interfaces of connected devices to back up the running configuration onto a USB drive (CORRECT)to ensure that the device loads the startup configuration file during startup
What is the port density of a switch?
the combined bandwidth of all ports on a switch (CORRECT)the number of available ports on a switch the bandwidth of a port the throughput of a port
What is a characteristic of the distribution layer in the three layer hierarchical model?
(CORRECT)provides access to the rest of the network through switching, routing, and network access policies distributes access to end users (WRONG)acts as the backbone for the network, aggregating and distributing network traffic throughout the campus represents the network edge
A network administrator has configured OSPFv2 on the two Cisco routers as shown. The routers are unable to form a neighbor adjacency. What should be done to fix the problem?
(WRONG) Add the command network 192.168.30.0 0.0.0.255 area 0 on router R1. (WRONG) Remove the FastEthernet0/0 passive interface configuration on router R1. (CORRECT) Change the IP address on S0/0 of router R2 to 192.168.20.2. (WRONG) Add the command network 192.168.20.1 0.0.0.0 area 0 on router R1.
Which two methods help to prevent the disruption of network services? (Choose two.)
(WRONG) removing switches which cause loops (WRONG) using VLANs to segment network traffic (CORRECT) using redundant connections to provide alternate physical paths (WRONG) changing the routing protocols at regular intervals (CORRECT) installing duplicate equipment to provide failover services
Refer to the exhibit. A network administrator is configuring a standard IPv4 ACL. What is the effect after the command no access-list 10 is entered?
(WRONG)ACL 10 is removed from both the running configuration and the interface Fa0/1. ACL 10 is disabled on Fa0/1. ACL 10 will be disabled and removed after R1 restarts. (CORRECT)ACL 10 is removed from the running configuration.
Refer to the exhibit. A network administrator has configured OSPFv2 on the two Cisco routers as shown. The routers are unable to form a neighbor adjacency. What should be done to fix the problem?
(WRONG)Add the command network 192.168.30.0 0.0.0.255 area 0 on router R1. (WRONG)Remove the FastEthernet0/0 passive interface configuration on router R1. (CORRECT)Change the IP address on S0/0 of router R2 to 192.168.20.2. (WRONG)Add the command network 192.168.20.1 0.0.0.0 area 0 on router R1.
What are the two purposes of an OSPF router ID? (Choose two.)WRONGUS
(WRONG)to enable the SPF algorithm to determine the lowest cost path to remote networks CORRECT to uniquely identify the router within the OSPF domain (CORRECT) to facilitate router participation in the election of the designated router (WRONG) to facilitate the transition of the OSPF neighbor state to Full (WRONG) to facilitate the establishment of network convergence
Refer to the exhibit. A network administrator has configured ACL 9 as shown. Users on the 172.31.1.0 /24 network cannot forward traffic through router CiscoVille. What is the most likely cause of the traffic failure?WRONGUS
(WRONGUS) The permit statement specifies an incorrect wildcard mask. (WRONGUS)The established keyword is not specified. (CORRECT) The sequence of the ACEs is incorrect. (WRONGUS)The port number for the traffic has not been identified with the eq keyword.
A user is reading a book from the website https://www.books-info.com/author1a/book2.html#page100. Which part of the web link is called a fragment?
/book2.html https:// (CORRECT)#page100 /author1a
Which number represents the most severe level of syslog logging?
0
A user reports that the workstation cannot connect to a networked printer in the office in order to print a report created with word processing software. Which troubleshooting action by the helpdesk technician would follow the divide-and-conquer approach?
Ask the user to launch the web browser. Ask the user to save the working document. (CORRECT)Ask the user to issue the ipconfig command. Ask the user to unplug and reattach the network cable.
What is the significant characteristic of worm malware?
CORRECT A worm can execute independently of the host system. radio_button_unchecked Worm malware disguises itself as legitimate software. radio_button_unchecked A worm must be triggered by an event on the host system. radio_button_unchecked Once installed on a host system, a worm does not replicate itself.
Which three statements are generally considered to be best practices in the placement of ACLs? (Choose three.)
CORRECT Filter unwanted traffic before it travels onto a low-bandwidth link. check_box_outline_blank For every inbound ACL placed on an interface, there should be a matching outbound ACL. check_box_outline_blank Place extended ACLs close to the destination IP address of the traffic. check_box_outline_blank Place standard ACLs close to the source IP address of the traffic. CORRECT Place extended ACLs close to the source IP address of the traffic. CORRECT Place standard ACLs close to the destination IP address of the traffic.
Which QoS technique retains excess packets in a separate queue for later transmission?
CORRECT shaping radio_button_unchecked queuing radio_button_unchecked classifying radio_button_unchecked marking
Which type of NAT maps a single inside local address to a single inside global address?
CORRECT static radio_button_unchecked dynamic radio_button_unchecked overloading radio_button_unchecked port address translation
Which type of Hypervisor is implemented when a user with a laptop running the Mac OS installs a Windows virtual OS instance?
CORRECT type 2 type 1 bare metal virtual machine
An administrator has configured an access list on R1 to allow SSH administrative access from host 172.16.1.100. Which command correctly applies the ACL?
R1(config-line)# access-class 1 out R1(config-if)# ip access-group 1 in R1(config-if)# ip access-group 1 out (CORRECT)R1(config-line)# access-class 1 in
Refer to the exhibit. If the switch reboots and all routers have to re-establish OSPF adjacencies, which routers will become the new DR and BDR?
Router R4 will become the DR and router R3 will become the BDR. (CORRECT)Router R4 will become the DR and router R1 will become the BDR. Router R1 will become the DR and router R2 will become the BDR. Router R2 will become the DR and router R3 will become the BDR.
Which statement describes a feature of site-to-site VPNs?
The VPN connection is not statically defined. VPN client software is installed on each host. Individual hosts can enable and disable the VPN connection. CORRECT Internal hosts send normal, unencapsulated packets.
What is the function of ASIC(Application Specific Integrated Circuit) in a multilayer switch?
They provide power to devices such as IP phones and wireless access points through Ethernet ports. (CORRECT)They streamline forwarding of IP packets in a multilayer switch by bypassing the CPU. They aggregate multiple physical switch ports into a single logical port. They prevent Layer 2 loops by disabling redundant links between switches.
Which two types of VPNs are examples of enterprise-managed remote access VPNs? (Choose two.)
WRONG GRE over IPsec VPN CORRECT Clientless SSL VPN CORRECT Client-based IPsec VPN WRONG IPsec Virtual Tunnel Interface VPN WRONG IPsec VPN
What term describes adding a value to the packet header, as close to the source as possible, so that the packet matches a defined policy?
Traffic shaping policing weighted random early detection (WRED) (CORRECT)traffic marking tail drop
Which three traffic-related factors would influence selecting a particular WAN link type? (Choose three.)
WRONG reliability (CORRECT) security needs (CORRECT) type of traffic WRONG cost of the link (WRONG) distance between sites CORRECT amount of traffic
When JSON data format is being used, what characters are used to hold objects?
(CORRECT)double braces { } double colons : : double quotations " " double brackets [ ]
Find the ospf cost in the exhibit.
Cost = Reference bandwidth / Interface bandwidth. The default reference bandwidth is 100mbps
Refer to the exhibit. Which data format is used to represent the data for network automation applications?
XML (CORRECT)YAML JSON HTML
What defines a two-tier spine-leaf topology?WRONG
(CORRECT) The Cisco APICs and all other devices in the network physically attach to leaf switches. (WRONG) The spine tier can be implemented with Cisco Nexus 9500 switches connected to each other and to the leaf switches. (WRONG) Everything is two hops from everything else. (WRONG)
A network technician has used the access-llst 1 permit 172.16.0.0 0.0.0.255 command to configure NAT on an edge router to translate only four networks, 172.16.0.0 /24, 172.16.1.0 /24, 172.16.2.0 /24, and 172.16.3.0 /24. After receiving complaints about limited access to the Internet, issuing the show ip nat translations command reveals that some networks are missing from the output. Which change will resolve the problem?
(CORRECT) The access list should be replaced with access-list 1 permit 172.16.0.0 0.0.3.255. The access list should be replaced with access-list 1 permit 172.16.0.0 255.255.255.0. (WRONG) The access list should be replaced with access-list 1 permit 172.16.0.0 0.0.0.255. The access list should be replaced with access-list 1 permit 172.16.0.0 0.0.1.255.
Refer to the exhibit. The network administrator that has the IP address of 10.0.70.23/25 needs to have access to the corporate FTP server (10.0.54.5/28). The FTP server is also a web server that is accessible to all internal employees on networks within the 10.x.x.x address. No other traffic should be allowed to this server. Which extended ACL would be used to filter this traffic, and how would this ACL be applied? (Choose two.)
(CORRECT) access-list 105 permit tcp host 10.0.70.23 host 10.0.54.5 eq 20 access-list 105 permit tcp host 10.0.70.23 host 10.0.54.5 eq 21 access-list 105 permit tcp 10.0.0.0 0.255.255.255 host 10.0.54.5 eq www access-list 105 deny ip any host 10.0.54.5 access-list 105 permit ip any any (CORRECT) R1(config)# interface gi0/0 R1(config-if)# ip access-group 105 out
Refer to the exhibit. R1 is configured for static NAT. What IP address will Internet hosts use to reach PC1?
(CORRECT)209.165.200.225 192.168.0.1 192.168.0.10 209.165.201.1
Refer to the exhibit. What is the OSPF cost to reach the router A LAN 172.16.1.0/24 from B?
(CORRECT)65. OSPF cost is reference bandwidth / interface bandwidth
Which two statements describe remote access VPNs? (Choose two.)
(CORRECT)Client software is usually required to be able to access the network. Remote access VPNs are used to connect entire networks, such as a branch office to headquarters. (CORRECT)Remote access VPNs support the needs of telecommuters and mobile users. End users are not aware that VPNs exists. A leased line is required to implement remote access VPNs.
Which two layers of the OSI model are associated with SDN network control plane functions that make forwarding decisions? (Choose two.)
(CORRECT)Layer 3 (CORRECT)Layer 2 Layer 1 Layer 4 Layer 5
Refer to the exhibit. The Gigabit interfaces on both routers have been configured with subinterface numbers that match the VLAN numbers connected to them. PCs on VLAN 10 should be able to print to the P1 printer on VLAN 12. PCs on VLAN 20 should print to the printers on VLAN 22. What interface and in what direction should you place a standard ACL that allows printing to P1 from data VLAN 10, but stops the PCs on VLAN 20 from using the P1 printer? (Choose two.)
(CORRECT)Outbound R2 S0/0/1 R2 Gi0/1.20 (WRONG)Inbound (CORRECT)R1 Gi0/1.12 R1 S0/0/0
Refer to the exhibit. Why are routers R1 and R2 not able to establish an OSPF adjacency?
(CORRECT)The serial interfaces are not in the same area. (WRONG) A backbone router cannot establish an adjacency with an ABR router. (WRONG) The router ID values are not the same in both routers. (WRONG) The process numbers are not the same in both routers.
What is a difference between the functions of Cloud computing and virtualization?
Cloud computing provides services on web-based access whereas virtualization provides services on data access through virtualized Internet connections. (CORRECT)Cloud computing separates the application from the hardware whereas virtualization separates the OS from the underlying hardware. Cloud computing requires hypervisor technology whereas virtualization is a fault tolerance technology. Cloud computing utilizes data center technology whereas virtualization is not used in data centers.
What are the ospf states in order.
Down, Init, 2-way, Exstart, Exchange, Loading, Full
What is correct in relation to NAT for IPv6?
Dual stack is an example of implementation of NAT for IPv6. NAT64 has been deprecated by IETF in favor of NAT-PT. (CORRECT)It is a temporary mechanism to assist in the migration from IPv4 to IPv6. It is used to convert private IPv6 addresses to public IPv6 addresses.
Which QoS mechanism allows delay-sensitive data, such as voice, to be sent first before packets in other queues are sent?
FIFO radio_button_unchecked FCFS radio_button_unchecked CBWFQ CORRECT LLQ
Which SNMP message type informs the network management system (NMS) immediately of certain specified events?
GET request GET response (CORRECT )Trap SET request
Refer to the exhibit. What has to be done in order to complete the static NAT configuration on R1?
Interface Fa0/0 should be configured with the command no ip nat inside. R1 should be configured with the command ip nat inside source static 209.165.200.1 192.168.11.11. (CORRECT)Interface S0/0/0 should be configured with the command ip nat outside. R1 should be configured with the command ip nat inside source static 209.165.200.200 192.168.11.11.
Which type of tool would an administrator use to capture packets that are going to and from a particular device?
Knowledge base Baselining tool (CORRECT)Protocol analyzer NMS tool
Which two types of devices are specific to WAN environments and are not found on a LAN? (Choose two.)
check_box_outline_blank Access layer switch CORRECT Broadband modem check_box_outline_blank Core switch CORRECT CSU/DSU check_box_outline_blank Distribution layer router
Which command will backup the configuration that is stored in NVRAM to a TFTP server?
copy running-config tftp (CORRECT)copy startup-config tftp copy tftp startup-config copy tftp running-config
Which technology provides laptops the ability to function on a cellular network?
radio_button_checked 802.11 Wi-Fi CORRECT Mobile hotspot radio_button_unchecked Bluetooth radio_button_unchecked Infrared
If a router has two interfaces and is routing both IPv4 and IPv6 traffic, how many ACLs could be created and applied to it?
radio_button_unchecked 4 CORRECT 8 radio_button_unchecked 12 radio_button_unchecked 6 radio_button_unchecked 16
